skip to main content
10.1145/2379690.2379698acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvizsecConference Proceedingsconference-collections
research-article

Visualizing distributed memory computations with hive plots

Published: 15 October 2012 Publication History

Abstract

A hive plot is a network layout algorithm that uses a parallel coordinate plot in which axes are radially arranged and node position is based on structural properties of that node [8]. We apply hive plots to message-passing communication networks formed by different high performance computing applications at Lawrence Berkeley National Laboratory. Hive plots have advantages over common network visualization methods, abandoning the popular "hairballs" of force-directed network layouts and opting instead for a tunable, repeatable, and interpretable view of network-theoretic properties. Small multiples of these hive plots, called hive panels, are analyzed to suggest which properties contribute to accurate classification of application behavior for anomaly detection in high performance computing environments.

References

[1]
A. Aris and B. Shneiderman. Designing Semantic Substrates for Visual Network Exploration. Information Visualization, 6(4):281--300, 2007.
[2]
K. Asanovic, R. Bodik, B. Catanzaro, J. Gebis, P. Husbands, K. Keutzer, D. Patterson, W. Plishker, J. Shalf, S. Williams, and K. Yelick. The landscape of parallel computing research: A view from Berkeley. Technical Report UCB/EECS-2006-183, University of California, Berkeley, 2006.
[3]
S. Axelsson. Visualization for Intrusion Detection: Hooking the Worm. In Proceedings of the 8th European Symposium on Research in Computer Security, pages 309--325, 2003.
[4]
J. Borrill, J. Carter, L. Oliker, D. Skinner, and R. Biswas. Integrated Performance Monitoring of a Cosmology Application on Leading HEC Platforms. In Proceedings of the 2005 International Conference on Parallel Processing, pages 119--128, 2005.
[5]
P. Colella. Defining Software Requirements for Scientific Computing. Technical report, DARPA High Productivity Computing Systems, 2004.
[6]
G. Conti. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press, 2007.
[7]
G. Csardi and T. Nepusz. The igraph Software Package for Complex Network Research. Inter Journal Complex Systems, 2006.
[8]
M. Krzywinski, I. Birol, S. J. M. Jones, and M. A. Marra. Hive Plots -- Rational Approach to Visualizing Networks. Briefings in Bioinformatics, 2011.
[9]
P. Laskov, K. Rieck, C. Schäfer, and K.-R. Müller. Visualization of Anomaly Detection Using Prediction Sensitivity. In Proceedings of Sicherheit 2005, pages 197--208, 2005.
[10]
P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, K. Claffy, and A. Vahdat. Lessons from Three Views of the Internet Topology. Technical report, Coorperative Association for Internet Data Analysis, 2005.
[11]
E. Tufte. The Visual Display of Quantitative Information. Graphics Press, 2nd edition, 2001.
[12]
E. J. Wegman. Hyperdimensional Data Analysis Using Parallel Coordinates. Journal of the American Statistical Association, 85(411):664--675, 1990.
[13]
S. Whalen, S. Engle, S. Peisert, and M. Bishop. Network-Theoretic Classification of Parallel Computation Patterns. International Journal of High Performance Computing Applications, 26(2):159--169, 2012.
[14]
S. Whalen, S. Peisert, and M. Bishop. Network-Theoretic Classification of Parallel Computation Patterns. In Proceedings of the 1st International Workshop on Characterizing Applications for Heterogeneous Exascale Systems, 2011.
[15]
H. Wickham. ggplot2: Elegant Graphics for Data Analysis. Springer New York, 2009.
[16]
L. Wilkinson. The Grammar of Graphics. Springer, 2nd edition, 2005.
[17]
J. Xin, J. E. Dickerson, and J. A. Dickerson. Fuzzy Feature Extraction and Visualization for Intrusion Detection. In Proceedings of the 12th IEEE International Conference on Fuzzy Systems, pages 1249--1254, 2003.

Cited By

View all
  • (2024)Quantum-Enhanced Representation Learning: A Quanvolutional Autoencoder Approach against DDoS ThreatsMachine Learning and Knowledge Extraction10.3390/make60200446:2(944-964)Online publication date: 1-May-2024
  • (2024)The policy is dead, long live the policy—Revealing science, technology, and innovation policy priorities and government transitions via network analysisQuantitative Science Studies10.1162/qss_a_00295(1-15)Online publication date: 16-May-2024
  • (2024)Scenario Storyline Discovery for Planning in Multi‐Actor Human‐Natural Systems Confronting ChangeEarth's Future10.1029/2023EF00425212:9Online publication date: 19-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
VizSec '12: Proceedings of the Ninth International Symposium on Visualization for Cyber Security
October 2012
101 pages
ISBN:9781450314138
DOI:10.1145/2379690
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. high performance computing
  3. hive plots
  4. network visualization

Qualifiers

  • Research-article

Conference

VizSec '12

Acceptance Rates

Overall Acceptance Rate 39 of 111 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Quantum-Enhanced Representation Learning: A Quanvolutional Autoencoder Approach against DDoS ThreatsMachine Learning and Knowledge Extraction10.3390/make60200446:2(944-964)Online publication date: 1-May-2024
  • (2024)The policy is dead, long live the policy—Revealing science, technology, and innovation policy priorities and government transitions via network analysisQuantitative Science Studies10.1162/qss_a_00295(1-15)Online publication date: 16-May-2024
  • (2024)Scenario Storyline Discovery for Planning in Multi‐Actor Human‐Natural Systems Confronting ChangeEarth's Future10.1029/2023EF00425212:9Online publication date: 19-Sep-2024
  • (2021)Visual Analysis of Multilayer NetworksSynthesis Lectures on Visualization10.2200/S01094ED1V01Y202104VIS0128:1(1-150)Online publication date: 8-Jun-2021
  • (2020)Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in NetworksIEEE Access10.1109/ACCESS.2020.29732308(31317-31329)Online publication date: 2020
  • (2019)The State of the Art in Multilayer Network VisualizationComputer Graphics Forum10.1111/cgf.1361038:6(125-149)Online publication date: 28-Mar-2019
  • (2019)Machine Learning for DDoS Attack Classification Using Hive Plots2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)10.1109/UEMCON47517.2019.8993021(0401-0407)Online publication date: Oct-2019
  • (2018)Visual Methods and Tools for Social Network AnalysisEncyclopedia of Social Network Analysis and Mining10.1007/978-1-4939-7131-2_268(3298-3314)Online publication date: 12-Jun-2018
  • (2017)Network-wide intrusion detection supported by multivariate analysis and interactive visualization2017 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VIZSEC.2017.8062198(1-8)Online publication date: Oct-2017
  • (2016)A Survey on Information Visualization for Network and Service ManagementIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245053818:1(285-323)Online publication date: Sep-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media